Paul Rosenzweig
  • Home
  • About
    • Public PGP
  • Consulting
  • Law
  • Publications
  • Media
  • Contact
Select Page
How Concerned Should We Be about IoT Vulnerability?

How Concerned Should We Be about IoT Vulnerability?

by Paul Rosenzweig | Feb 11, 2016 | Artificial intelligence, Cybersecurity, Data Privacy, National Security

In 2006, when the Office of the Director of National Intelligence provided its first “Annual Threat Asssessment” top billing went to the “Global Jihadist Threat.” Rounding out the top three concerns, Director Negroponte mentioned the then-ongoing…
President Obama’s National Cybersecurity Plan

President Obama’s National Cybersecurity Plan

by Paul Rosenzweig | Feb 8, 2016 | Cybersecurity, National Security

In connection with today’s budget roll-out, President Obama has announced a National Cybersecurity Plan. Highlights of his national action plan include the following: In connection with today’s budget roll-out, President Obama has announced a…
Encryption and Law Enforcement Special Access: The U.S. Should Err on the Side of Stronger Encryption

Encryption and Law Enforcement Special Access: The U.S. Should Err on the Side of Stronger Encryption

by Paul Rosenzweig | Sep 3, 2015 | Cybersecurity, Homeland Security, National Security

A debate is currently raging between FBI Director James Comey and much of the technology community over whether law enforcement should have some sort of special access, which has been called a backdoor, into encrypted communications and data.[1] In…
How Concerned Should We Be about IoT Vulnerability?

Users Weigh in on What Database the PLA Should Hack Next

by Paul Rosenzweig | Jul 30, 2015 | Cybersecurity, Homeland Security, National Security

The results are in. Lawfare’s “Name that Database” contest is now closed. All we can say is that Lawfare readers are a remarkably creative—and scary—bunch of folks. Some of these ideas are really quite spectacular. The results are in. Lawfare’s “Name…
How Concerned Should We Be about IoT Vulnerability?

Unclassified Databases for the Chinese Part II

by Paul Rosenzweig | Jul 26, 2015 | Cybersecurity, National Security

Ben’s list of unclassified databases for the Chinese to steal is just too much fun not to follow up. At the risk of piling on, here are a few more that a good Chinese spy ought to look at: Ben’s list of unclassified databases for the Chinese to steal…
How Concerned Should We Be about IoT Vulnerability?

The OPM Data Breach: Raising All Sorts of Government Enforcement and Privacy Protection Questions

by Paul Rosenzweig | Jun 6, 2015 | Cybersecurity, National Security

Reports that China (most likely) has breached Office of Personnel Management (OPM) systems and stolen personal information (PI) of over four million current and/or former federal employees raises all sorts of questions regarding the government’s…
« Older Entries
Next Entries »

Recent Articles

  • Europe and US Tech Dependency July 28, 2025
  • The Security by Design Project: An Annotated Review June 29, 2025
  • The Future of American Cybersecurity June 23, 2025
  • The Supreme Court’s Inconsistency Is Very Revealing June 12, 2025
  • Coming Soon? U.S. Cyber Command in Domestic Networks June 5, 2025
  • How corporate America is taking a stand against Trump May 30, 2025
  • Election Security Is at Risk Amid Federal Government Actions | Opinion March 23, 2025
  • Increasing American Technological Independence Is a National Security Imperative March 21, 2025
  • Never Means Never January 19, 2025
  • Provably Autonomous Artificial Intelligence November 7, 2024

Article Categories

  • Artificial intelligence (13)
  • Cybersecurity (411)
  • Data Privacy (11)
  • Donald Trump (28)
  • Election Security (20)
  • Homeland Security (131)
  • National Security (133)
  • Privacy Statement
  • X
  • Instagram
Copyright© 2024  | Paul Rosenzweig, Esq. |  Email:info@paulrosenzweigesq.com  |  Website by PlanetLink